First published: Thu Apr 27 2023(Updated: )
Migration Toolkit for Applications 6.1.0 Images<br>Security Fix(es):<br><li> keycloak: path traversal via double URL encoding (CVE-2022-3782)</li> <li> spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client (CVE-2022-31690)</li> <li> xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow (CVE-2022-41966)</li> <li> Apache CXF: SSRF Vulnerability (CVE-2022-46364)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:2041 varies based on the specific vulnerabilities it addresses, including critical and high-severity vulnerabilities.
To fix RHSA-2023:2041, apply the recommended updates provided in the advisory for the affected applications.
RHSA-2023:2041 addresses path traversal and privilege escalation vulnerabilities among others.
Applications affected by RHSA-2023:2041 include Migration Toolkit for Applications, Keycloak, and Spring Security OAuth2 Client.
There are no specific workarounds recommended for RHSA-2023:2041 other than applying the security updates.